Passwords for networks and corporate information systems can be revealed if an iPhone or iPad is lost or stolen, said the researchers at the state-sponsored Fraunhofer Institute Secure Information Technology (Fraunhofer SIT). It is based on existing exploits that provide access to large parts of the iOS file system even if a device is locked.

In a video that demonstrates the attack, the researchers first jailbreak the phone using existing software tools. They then install an SSH server on the iPhone that allows software to be run on the phone. The third step is to copy a keychain access script to the phone. The script uses system functions already in the phone to access the keychain entries and, as a final step, outputs the account details it discovers to the attacker.

The attack works because the cryptographic key on current iOS devices is based on material available within the device and is independent of the passcode, the researchers said. This means attackers with access to the phone can create the key from the phone in their possession without having to hack the encrypted and secret passcode.

Using the attack, researchers were able to access and decrypt passwords in the keychain, but not passwords in other protection classes.

Among passwords that could be revealed were those for Google Mail as an MS Exchange account, other MS Exchange accounts, LDAP accounts, voicemail, VPN passwords, WiFi passwords and some App passwords.

Researchers published a paper with full details of the attack's results.

"As soon as attackers are in the possession of an iPhone or iPad and have removed the device’s SIM card, they can get a hold of e-mail passwords and access codes to corporate VPNs and WLANs as well," said the researchers in a statement.

"Control of an e-mail account allows the attacker to acquire even more additional passwords: For many web services such as social networks the attacker only has to request a password reset."

The attack has particular significance for companies that allow employees to use iPhones on corporate networks, because it can reveal network access passwords.

"Owner’s of a lost or stolen iOS device should therefore instantly initiate a change of all stored passwords," said Fraunhofer SIT. "Additionally, this should be also done for accounts not stored on the device but which might have equal or similar passwords, as an attacker might try out revealed passwords against the full list of known accounts."

Researchers at Fraunhofer SIT have previously revealed security problems with other operating systems. In late 2009 they published multiple attack scenarios criminals could use to access files protected by Microsoft's BitLocker disk-encryption technology. Last year the institute began selling a Java phone application for securely storing passwords.

Comments

grouchosmith - 22:42 10-02-2011

Hey guys - don't bother with any update now. As expected, other sites have covered the story in more detail now.And for anyone coming late to this story: yes, this does appear to be serious - at least, for "corporate" users.

grouchosmith - 17:26 10-02-2011

Which iOS - 3 or 4? You've omitted a link to the video mentioned in your article, or anything else, such as the white paper, for that matter.I'm not an iOS security expert, but it is of particular interest to me (professionally). I know enough of the details (at a high level) so that there's no question in my mind that this would definitely be possible on a device still using iOS 3. But my (basic) understanding is that this shouldn't be possible (as described) on an iOS 4 device.Need more info...